Professional Documents
Culture Documents
Introduction
In this report we have written and analyzed about what a network is along with its types. We have
also written about networking protocols
Network
A network or computer network is simply collection of interconnected computers. It is also known
as group of two or more computers that can communicate with each other. Computer network is
one of the major and essential component which plays a vital role in evolution of computer system.
It allows users to share data, information and resources with each other from any place if they are
connected with each other. They are connected with each other using either wired media such as
optic cables, twisted pair cables, unshielded twisted pair cables or wirelessly.
Based on the area covered there are mainly three types of computer network.
of computers over a large area. WANs are used to provide communications between countries or
cities. Internet is one of the best example of WAN. WANs are used by telephones network,
network providers, cable systems or satellites. WANs are also used to share data all over the world.
Types of Networks
There are various types of networks they are based on how server and clients are connected with
each other. Types of network may vary from one network to another. Some of the most commonly
used network types are:
This type of network is easy to setup and maintain as all the computer manages itself. In this type
of network no cost for setting up server and maintaining it is required and it is less expensive. All
computers work individually so one computer dose not interrupt other computer’s operation. In
P2P network all computers act as server and client so there is no need of dedicated server.
In this type of network due to absence of centralized server it is difficult to backup and manage
data. Security is weak as the security of all computers is dependent in individual computes. Any
computer can be accessed any time. Users have to use separate passwords for separate computers.
2. Client-Server Network
In client-server network model there is a powerful computer known as server which provides
network services to all other user computers also known as clients to perform user’s tasks. In this
type of network there exists a central controller called server which is the main computer that
controls the network resources and provides services to all other computers in the network. Clients
requests a services then server provides those services to client in client server model. A server
manages security and resources which may include files, hardware or software and all the clients
communicate with each other through a centralized server. If client A wants to send data to client
B it first needs to send request to server to seek permission the server then grants the permission
and data can be transmitted from client A to client B. Most LANs are based on client server
network model.
Backup and management of data is possible and easy due to centralized server. Security is better in
client-server network as all the shared resources are centrally administered. Dedicated servers
improves performance of whole system. Dedicated servers improves speed of resource sharing.
It requires servers with large memory and secondary storage. So the cost is high. It requires
dedicated network administration. Cost of network operating system and networking devices is
also high.
3. Cloud Network
Cloud network is the accessing of storage, information or data on online level. In cloud network
resources are available on demand by the service provider who hosts them on cloud platform. In
cloud network users can access client computers but they cannot access server computers because
the server computer is kept with cloud server provider. If user needs access data from the cloud
server then user first sends request through internet and gets response from cloud server.
This type of network does not require servers so size of data centers can be reduced. In this type of
network data can be accessed from anywhere at any time. Hardware cost can be reduced. This
network provides high storage capacity for low cost. User do not need network administrators to
maintain server.
Since all cloud service providers are different cloud server may offer limited services. A cloud
server is not backed up. Cloud server requires constant internet connection. If error occurs in cloud
server then users will not be able to access the server until it is fixed by cloud service providers.
For connecting cloud servers users need to have a internet access.
4. Centralized Network
Centralized network is a type of network where all the computers are connected to a central server
where all information is stored. In centralized network all clients are connected to a central server
computer and it needs to request the central server computer for accessing its information. If the
server computer responds to the request of client the client can access information. Public and
instant messaging platform use centralized server.
It is easier to manage data in centralized network as there is only one server. Data can be secured
as the security of server is high. Cost of a centralized server is cheaper and it is easy to configure.
In centralized network all data are in same server so loss of data is possible. Centralized networks
require high skilled IT officers and administrators. This type of network is expensive.
5. Cluster Network
Cluster network is a group of interconnected computers which works together as a single system.
In this system each node is set to perform different task at a given time which is controlled and
scheduled by a software. The nodes are connected through LANs and each node is operating its
own instance of Operating System.
In cluster network same data are backed up in different servers so data recovery can be obtained.
Data is stored in different servers so this type of network has high processing capacity.
This type of network requires various hardware, software and skilled professionals to operate so
cost is high. This type of network is hard to monitor and maintain.
6. Virtual Network
Virtual network are the network mad in a virtual environment. This network is made within a
operating system using virtual machines. While physical networking connects computers through
cabling and other hardware, virtual networking extends these capabilities by using software
management to connect computers and servers over the Internet. Virtual networks do not require
physical connection like cabling.
Virtual network are cheaper than other networks as they do not require physical connection and
networking devices. Virtual networks offers flexible routing methods. Virtual networks improves
network traffics.
Even if virtual network is cheaper it requires high performing computers. Virtual networks are less
efficient. Performance of host computers is hindered while running many virtual computers.
Networking Standard
Networking standards define how data is transmitted in a network. Based on how data is
transmitted over a network there are different networking standards. Here are three main
networking standards:
I. Application Layer
II. Presentation Layer
III. Session Layer
IV. Transport Layer
V. Network Layer
VI. Data Link Layer
VII. Physical Layer
I. Application Layer
Application layer is used as bridge for user and applications to access network services. Network
transparency and resource allocation are handled by application layer. This layer provides function
to users. The main function of this layer is to handle files stored in remote computers and give user
access to those files.
V. Network Layer
This layer manages device addressing and tracks the location of all the devices on the network. It
also determines the ideal path for data to move from source to the destination based on the
condition of network, priority of service, and other various factors. This layer provides connection
between different devices and adds source and destination addresses to header and determines the
best path from source to destination.
Physical layer transmits individual bits from sender to receiver. This layer establishes, maintains
and deactivates the physical connection. It is the lowest layer of OSI Model. This layer defines
how devices are physically connected, defines transmission mode and defines the topology of that
network.
OSI model acts as guideline in designing network model. Changes in one layer of OSI model does
not have any impact on any other layer. This model supports both wired and wireless service.
OSI model is a theoretical model and is very complex as it has many layers. Some layers of OSI
model have very less function.
2. TCP/IP Model
TCP/IP model was developed after OSI model and is compressed version of OSI model. TCP/IP
model has four layers
I. Process/Application Layer
II. Host-to-Host/Transport Layer
III. Internet Layer
IV. Network Access/Link Layer
I. Application layer
It is the topmost layer of TCP/IP model. Application layer allows user to interact with the
application. It forwards data to transport layer in order to communicate with other layers. This
layer allows user to access various email services, remote log on etc. This layer combines the
functions of interfaces with various applications, data encoding and data translation for the users to
communicate with networking system.
This layer is responsible for the reliability, flow control, and correction of data which is being sent
over the network. This layer has two protocols Transmission Control Protocol (TCP) and User
Datagram Protocol (UDP). Both the protocols are used for sending data over a network. This layer
also adds headers to data which is being sent. This layer divides data into various parts and
arranges sequence on which those parts are being sent.
The function of internet layer is to send the packets from any network, and they arrive at the
destination irrespective of the route they take. This layer holds TCP/IP model together. This layer
uses Internet Protocol. This layer determines the best path for packets to travel. This layer
corresponds to network layer of OSI model.
Network Access layer is the lowest layer of the TCP/IP model and is combined with Physical layer
and Data Link layer defined in the OSI model. This layer defines how the data should be sent
physically through the network and is responsible for the transmission of the data between two or
more devices on the same network. This layer uses physical address to identify host computer to
deliver data.
TCP/IP model can easily be used in practical networking. It allows communication between
multiple networks. TCP/IP model provides IP to all hosts making them identifiable on the network.
TCP/IP model is not optimizable in small network. This model is complicated model to set up and
manage. TCP/IP model has no clear separation from its services, interfaces, and protocols.
variable sized packets and specifies the development and handling of compatible devices and
equipment.
4. It uses two separate layers to define 4. It uses only one layer to define
functionality of lower layers. functionality of lower layers
5. It well documented and explains standards 5. It is not well documented and briefly
and protocols in more details explains standards and protocols.
Network Topology
Topology is the structure of the network of how all the components are interconnected to each
other. Topology of a network defines how data is transmitted in that network. There are five types
of network topologies they are:
1. Bus topology
2. Ring topology
3. Star topology
4. Mesh topology
5. Tree topology
6. Hybrid topology
1. Bus topology
In bus topology all the stations are connected through a single cable also known as backbone cable.
In this topology each node is either connected to the backbone cable by drop cable or is directly
connected to the backbone cable. In bus topology when a node wants to send a message over the
network, it puts a message over the network. All the stations available in the network will receive
the message whether it has been addressed or not. The configuration of bus topology is simpler
compared to other topology.
Bus topology is cheap and can be easily configured. Hardware components for bus topology are
easily available. Failure in one node does not affect other nodes in bus topology. Bus topology is
simpler but still requires lot of cabling. Bus topology requires special test equipment to determine
cable faults. If any fault occurs on cable then all communication for nodes will disrupt. In bus
topology adding new device will slow the network.
2. Ring Topology
In ring topology all the nodes are connected end to ends and node that receives message will
retransmit it to next node. In ring topology data flows only in one direction. Data flows in a loop
and can only flow in clockwise or anticlockwise direction. Nodes use tokens in order to send data
and token also flows in only one direction.
In ring topology faulty devices can be removed without bringing the network down. It uses twisted
pair cables which are easily available so installation cost is low. It is more reliable because it does
not depend on single host computer. Like bus topology it uses special test equipment to determine
cable faults. Fault on cable would disrupt whole network. Adding new devices would slow the
network.
3. Star topology
In star topology all the nodes are centrally connected to a single hub or switch. The central
computer is known as server and the other computers are known as clients. In this topology co-
axial cables or RJ-45 cables are used.
Complex network control features can easily be attained in star topology. Troubleshooting in
network is quite easier compared to bus topology. Failure of cable will not interrupt the whole
network as nodes are connected to central hub. Star topology is easily expandable as new nodes
can be added in open hub ports. Star topology uses coaxial cable so it is cost efficient. Failure in
central computer would interrupt whole network.
4. Mesh Topology
In mesh topology computers are interconnected with each other through various connections and
there are multiple paths from one computer to another. It does not contain switch, hub or a central
computer. This topology is generally used for wireless communication. Internet is the best example
of mesh topology.
Mesh topology is reliable and any link breakdown will not affect communication of connected
computers. In mesh topology communication is very fast between nodes. In mesh topology adding
new devices will not disrupt the network. Mesh topology is expensive than other topologies.
Networks in mesh topology are large and hard to maintain.
5. Tree Topology
In tree topology all the computers are connected in hierarchical way. It is the combination of bus
and star topology. There is only one path for data transmission hence it forms parent-child
hierarchy.
Signals can be sent to long distance without being reduced. Adding new devices to existing
network can be easily attained. In tree topology whole network is divided into segments so it can
be easily maintained. In tree topology error detection and maintenance can be done easily. Tree
topology is expensive as it requires lot of cables for connection. In tree topology if new devices are
added reconfiguration is difficult.
6. Hybrid Topology
Hybrid topology is a topology with combination of multiple topologies. In hybrid topology the
topologies are combined as per requirement of organization. This topology can be useful when a
organization needs multiple topologies for same network and can afford it. Hybrid topology
inherits both the advantages and disadvantages of topologies it has included.
This topology is one of the most effective topology. Hybrid topology is highly reliable. Hybrid
topology can inherit benefits of multiple topologies. Hybrid topology is highly flexible. This
topology makes network complex.
Internet Protocol helps in securely connect user to Internet. IP also helps in securely sending data
over the internet.
User Datagram Protocol helps in sending messages quickly in the internet. UDP is used when
messages are needed to be sent fast and when quality does not matter.
File Transfer Protocol is helps in storing and downloading files stored in server.
Simple Mail Transfer Protocol helps in sending mails throughout internet securely. SMTP also
user to quickly send mails.
DNS helps in accessing domains with their names rather than their IP addresses and makes domain
user friendly.
DHCP automatically provides IP addresses which makes it easier for user to not remember IP
addresses. DHCP helps in reducing IP redundancy as it provides unique IP to all hosts.
Networking Devices
There are various devices used in networking some of them may be used in connecting computers
using wires and some may be used in connecting computers wirelessly, some may be used in
strengthening network signals. Some of the most commonly used networking devices are:
1. Hub
2. Switch
3. Multilayer Switch
4. Repeater 5. Bridge
6. Gateway
7. Access Point
8. Modem
9. Router
10. Host-Based Intrusion Detection System (HIDS)
11. Content Filter
12. Load Balancer
1. Hub
Hub is a networking device used for connecting two or more computers. Hubs have multiple ports
where computers are connected using wires. When data arrives from a port to hub it sends it to all
other ports. Ports in hub may vary generally 4-5 port hub are used in home whereas 8-16 port hub
are used in small offices varying on computers used. It operates on physical layer of OSI model.
2. Switch
Switch is advance version of hub it is also used for connecting two or more computers. Unlike hub
switch filter forwards the data so that data is only received by the host intending to receive it.
Switch determines the receiver of data by at Media Access Control (MAC) address. It operates on
Data-link layer of OSI model.
3. Multilayer Switch
Multilayer switch is a networking device which operate on all layers of OSI model unlike
traditional switch which operates on Data-link layer. It routes and switches decision based on
MAC addresses on data link frame, IP addresses on header of network layer and port number on
header of transport layer.
4. Repeaters
Repeater is a networking device which receives a signal and emits that signal at a higher level. A
receiver has two ports and its main function is to amplify the signal it receives before it corrupted
or weak. It operates on Physical Layer of OSI model.
5. Bridge
Bridge is a networking device used in connecting two subnetworks of same network. Bridge is also
used in filtering network segments by examining MAC address of destination. Bridge has two
ports one input port and one output port. It operates on Data-link layer of OSI model.
6. Gateway
Gateway is a networking device used in connecting two networks which may work on different
networking models. The main function of gateway is to take message from one network interpret it
and send it to another network. It works on Network layer of OSI model.
7. Access Point
Access Point is a networking device used in wireless local area networks which is used for sending
and receiving signals. Access Point serves as interconnection between wired and wireless
networks. One access point may have multiple user and when the user moves from one place to
another it connects on nearest access point.
8. Modem
Modem (Modulator-Demodulator) is a networking device used for translating digital signals into
analog signals and vice versa. It allows computers to send and receive data along telephone signals
or satellite connection. Modulator converts digital signals to analog signals and demodulator
converts analog signal to digital signals
9. Router
Router is a networking device which can receive, analyze and forward data packets from one node
to another by processing the routing information on that packet. Routers also perform as Network
Address Translator (NAT) which is used for converting private IP addresses to public IP addresses
as it connects local area network to wide area network. It works on Network layer of OSI model.
hardware. Content filters are used by big corporations as firewalls or by home users to filter the
content their children have access to by a computer.
Server
A server is a software or hardware device that accepts and responds to requests made over a
network. The device that makes the request, and receives a response from the server, is called a
client. “On the Internet, the term "server" commonly refers to the computer system which receives
a request for a web document, and sends the requested information to the client” (What is a
Server ?, n.d.). Based on what a server does there are various types of server and some of them are:
1. Web Server
2. File Server
3. Database Server
4. Print Server
5. Virtual Server
6. Terminal Server
7. Combination Server
1. Web Server
A web server is a server which stores one or many websites and satisfy the request provided by
clients. This server uses Hypertext Transfer Protocol (HTTP) to respond to client requests. “It is
accessed through the domain names of websites and ensures the delivery of the site's content to the
requesting user. As hardware, a Web server is a computer that holds web server software and other
files related to a website, such as HTML documents, images and JavaScript files. Web server
hardware is connected to the internet and allows data to be exchanged with other connected
devices” (Rouse, n.d.).
2. File Server
A file server is a server which is used for storing files in a network. It provides its large storage
capacity to the clients. “File servers therefore offer users a central storage place for files on internal
data media, which is accessible to all authorized clients. Here, the server administrator defines
strict rules regarding which users have which access rights: For instance, the configuration or file
authorizations of the respective file system enable the admin to set which files can be seen and
opened by a certain user or user group, and whether data can only be viewed or also added, edited,
or deleted.” (File server, 2019)
3. Database Server
A database server is a server used to store databases. It can be accessed while a user is trying to log
in or log out of the application which uses database. Database server may hold database for one or
many applications. This server also provides database services. This servers can also be accessed
through backend by using query languages.
4. Print Server
A print server is a server used for managing printers and printing tasks. This server connects all
printers of an organization to client computers. When a client sends printing request the print
server directs this request to printer. This server allows user to handle printing jobs without having
to move files from one computer to the computer printer is connected to.
5. Virtual Server
A virtual server is a server that shares hardware with other operating systems. This server is cost
effective. A virtual server mimics the functions of a server and many virtual server may run on one
dedicated server. Virtual servers may be obtained by using software such as VMware, Virtual Box
etc.
6. Terminal Server
“A terminal server is a server that enables one or more terminals to connect to a local area network
(LAN) or the Internet without the need for each terminal to have a network interface card (NIC) or
modem. Terminals can be PCs, printers, IBM 3270 emulators or other devices with a RS-232 /
RS423 serial port interface. Terminal servers can often support connections of up to 128 terminal
devices “(Beal, n.d.). Terminal servers are used to connect client computers to internet without
needing NIC.
7. Combination Server
A combination server is a server that fulfills multiple requirements. This server can provide
different services such as file and print, web, database, application etc. A combination server can
be cost effective and can be used by small organizations as this server can provides facilities of all
other servers in a single server.
Hardware Requirements
Server requires following hardware requirements:
Processor 3 GHz
RAM 24 GB
Hard Drive 4 TB
Graphics Coprocessor None
Processor Count 1
Hard Drive Interface Serial ATA
Connectivity Serial
Network 1 x 1GbE ports standard
Power Single Power Supply
Server Software
The software used by servers to operate the functions is called server software. It is essential to
achieve all functions of a server. Sever software also essential in operating networking devices.
“Server software is a type of software that is designed to be used, operated and managed on a
computing server. It provides and facilitates the harnessing of underlying server computing power
for use with an array of high-end computing services and functions” (What is Server Software? -
Definition from Techopedia, n.d.). Some examples of server software are Apache, Tomcat,
OracleDB etc.
Client Software
The software used by clients or general for various purpose such as text editing, modelling,
programming, designing is called client software. These software are used in client computers
without having heavy impact on server. Client software may or may not depend on server
software. Some examples of client software are Microsoft Office, Visual Studio, MS SQL
Management studio etc.
Software Requirements
Software Client Server
Operating System Windows 7 Windows Server 2012
Firewall Juniper Tinywall
Firewall
“A firewall is a network security device, either hardware or software-based, which monitors all
incoming and outgoing traffic and based on a defined set of security rules it accepts, rejects or
drops that specific traffic” (Introduction of Firewall in Computer Network - GeeksforGeeks, n.d.).
A firewall is a barrier between private network and public network. In a LAN private network is
secured whereas public network is unsecured and firewall block the specific unsecured traffic.
Generally there are two types of firewall they are:
1. Host-based firewall
2. Network-based firewall
1. Host-based firewall
Host-based firewall is a firewall which is installed on each client computer which controls each
incoming and outgoing packet. It is a software which comes as a part of the operating system.
Hostbased firewalls are needed because network firewalls cannot provide protection inside a
trusted network. Host firewall protects each host from attacks and unauthorized access.
2. Network-Based firewall
Network based firewall filters all incoming and outgoing traffic across the network and protects the
internal network by filtering the traffic using rules defined on the firewall. A Network firewall
might have two or more network interface cards (NICs). A network-based firewall is usually a
dedicated system with proprietary software installed.
Range of Servers
Various server have various features and some server may have the best feature for the selection of
best server here is a list of servers:
Price:
Price:
Server is the most important part of a network system and a server must be reliable and should
have a good specifications. Among these three servers we would recommend using Dell
PowerEdge T640 on head office because it provides the operating capacity paid for its cost and is a
fast server with latest technology used. We think this server would have less problem and will not
overheat easily so this is the best server for using in head office. This server also has a lot of
features which will be helpful in head office.
As for branch offices we would recommend using Dell PowerEdge T340 as this server is of
reasonable price for the specification it provides and this server is quite fast and reliable for using
in branch offices. This server will be most useful for branch offices where there is less workload
and this server also consumes less power.
Even if mesh topology is expensive and complex while configuring it will have less problems in
future. Even if a problem arises in future it would be easier to maintain and fix that problem. All
clients in mesh topology can work independently even if they are connected to each other. Mesh
topology is most useful for large network. Mesh topology can be most beneficial topology for this
type network.
For branch offices we planned on using star topology. Star topology is useful for maintaining a
small LAN and branch offices will not have many computers. Star topology is not as expensive as
mesh topology and it has some of features of mesh topology as well. In star topology error in one
node will not affect other nodes. Star topology is easy to configure and modify. This topology is
fast with fewer computers and adding or removing new computers is easy. This topology requires
more networking devices. Star topology is best used in small network. The smaller the network is
data transfer rate is faster in star topology. This topology is can be maintained easily. This
topology is also useful while dividing subnets and we can divide sub nets based on switch the
computers are connected to.
Star topology is cheaper and easy to configure than mesh topology so using it in branch offices will
be most effective. Mesh topology may require more networking devices than mesh topology but it
is not a large price to pay compared to the usefulness of star topology. Star topology is most
beneficial for the network in branch offices.
By using Mesh topology in head office and Star topology in branch office our whole network will
be in hybrid topology. In hybrid topology we can utilize the benefits of both mesh and star
topology. This topology becomes most reliable by using mesh and star topology as its base. This
topology will have fast data transmission.
Introduction
Landmark IT Pvt. Ltd has paid us a capital of Rs.200 million to configure their network system.
The head office will be situated in Tilganga, Kathmandu and they will have 20 branch offices
around the country. They will provide different IT related services for different types of
organization like School, Bank, Colleges, INGO, NGO etc. I have been hired as a network/ system
administrator of this company to plan design implement and manage the entire network systems
considering IP addressing, server system, network devices, security devices & other miscellaneous
IT related services. We have to design a network system which meets all the condition presented to
us.
Network Design
Table of IP
Landmark IT Pvt. Ltd Head Office Tilganga, Kathmandu
Server IP Address Subnet Mask
Domain Controller server 192.168.1.2/29 255.255.255.248
DHCP server 192.168.1.3/29 255.255.255.248
DHCP Relay Agent 192.168.1.4/29 255.255.255.248
VPN Server 192.168.1.5/29 255.255.255.248
Landmark IT Pvt. Ltd Branch Office Pokhara
Server IP Address Subnet Mask
CDC server 192.168.2.2/29 255.255.255.248
RODC server 192.168.2.3/29 255.255.255.248
VPN Server 192.168.2.4/29 255.255.255.248
Firewall
We used firewall to monitor incoming and outgoing traffic and defined some security rules which
accepts, rejects and drops traffic. In this network firewall is used while connecting router to the
internet because all the incoming and outgoing traffic will come to router and go from router as
well.
Router
Router is a networking device which routes data and in this network we have used router to route
the connection from ISP to head office. While data comes from ISP firewall monitors the data and
then router routes it to other switches.
Switch
A switch is a networking device used for connecting computers in a network. In this network we
have used switches to connect server and clients computers. In head offices we have not used
many switches because we have used mesh topology but in branch offices we have used multiple
switches for connecting computers.
Access Point
An access point is a networking device which is used in wireless local area network to send
signals. In this network we have used access points to wirelessly connect laptops and tablets to our
network. We have connected access points on switches and through those access points users can
wirelessly join our network.
VPN Tunnel
We used VPN tunnel on VPN server to secure our data and block unauthorized users to connect in
our network. VPN tunnel encrypts our data while sending and decrypts our data while receiving
which decreases chances of data loss in our system.
Servers in use:
We have configured multiple servers on the server computer we bought after selecting. The servers
we configured are described below:
Domain controller server is the main server of our system and this server is kept in our head office.
This server has the information of all our users in head office. This server responds to
authentication request made by our clients and gives them permissions. All users of our domain are
created in this server.
In this system DNS server is configured in the same server as Domain Controller server. A DNS
server translates domain name to IP address and IP address to domain name. Since we have
configured this in our main server we did were not required to buy additional server for DNS
server.
In this system DHCP server provides IP address, Domain and gateway to clients head and branch
offices. This server is also kept in head offices and responds to requests of client who are
requesting for IP address.
In this system DHCP relay agent relays the request of clients from another network which is
branch offices. If user from branch office requests IP address then relay server relays the request to
DHCP server then it relays the response of DHCP server to clients.
Print Server
In this system we have used print server to manage printers and printing jobs. In head office this
server is configured in same server as Domain Controller and in branch office this server is
configured in same server as Child Domain Controller.
In this system we have used WDS server to install a client operating system in client computers.
This server is configured in same server as Domain Controller. First DHCP server provides IP to
new client computers then WDS server starts installing client operating system in our system.
In this system we have used VPN server to allow clients to access our network form a public
network. First the client computers should be connected in our system through public network then
this server provides IP to those clients. We have also used VPN tunnels in order to secure our
network from unauthorized users.
In this system we have used RODC server in branch offices to keep data backup of our domain
controller. RODC server only allows users of branch offices to see and check users of domain
controller but does not allow them to create a new user or modify a user.
In this system we have used CDC server in branch offices make a sub domain of our domain. CDC
acts as a Domain Controller and can create and modify its own users.
2 DNS server After typing name of domain in Nslookup gave name of our domain
nslookup it should give IP after typing IP address and it gave IP
address after typing name of our
address of that domain domain
3 DHCP server All clients in a network should Clients got IP addresses of the scope
get IP addresses we defined while configuring DHCP
server and address leashes were
shown in DHCP server
4 DHCP Relay Requests of clients in second Clients from another network got IP
Agent network should be relayed to address from the second scope we
DHCP server and clients in defined and address leashes were
another network should get IP shown in DHCP server
address.
5 WDS server Client operating system should Client operating system was
be deployed in client computers successfully installed in client
computers by logging in with a valid
username and password
7 RODC server All data of DC server should After logging in with a RODC
be displayed but users should account we were able to see all users
not be created or modified of our domain but we were not able
to create or modify users
9 VPN server User should be able to access a Users were able to connect to our
network from public network network after logging in with a valid
username and password
Maintenance Schedule
Figure 18
P7
After following all the steps mentioned above DC should be configured to check whether the
domain controller is installed correctly or not there is a simple way to evaluate it. For this open
server manager and click on local server. If the name of domain is in Domain. Then DC is
successfully configured.
1. First as usual go on server manager and then go to manage and then click on add roles and
features.
2. After that read the guidelines if you want to otherwise click next
7. After installation is
complete click on close
After following all the steps mentioned above DNS server should be configured correctly to check
whether DNS server is correctly configured or not open DNS Manager and right click on your
computer name then click on launch nslookup. After nslookup opens type the domain name and
your IP address should be displayed and then type your IP address and your domain name should
be displayed.
1. First as usual go on server manager and then go to manage and then click on add
roles and features.
2. After that read the guidelines if you want to otherwise click next 3. Select
installation type and click next.
4. Click on DHCP server and
click next
After following all the steps mentioned above DHCP server should be configured correctly to
check whether DHCP server is correctly configured or not open client computer and connect it in
the same LAN as DHCP server. After the client computer opens check Address Leashes on DHCP.
If there is a computer in Address Leashes then DHCP is configured correctly.
1. First as usual go on server manager and then go to manage and then click on add roles and
features.
2. After that read the guidelines if you want to otherwise click next
After following all the steps mentioned above DHCP relay agent should be configured correctly to
check whether DHCP relay agent is correctly configured or not open client computer and connect
it in the LAN other than DHCP server. After the client computer opens check Address Leashes on
DHCP. If there is a computer in Address Leashes is on scope different than the LAN DHCP server
is connected to then DHCP relay agent is configured correctly.
1. First as usual go on server manager and then go to manage and then click on add roles and
features.
2. After that read the guidelines if you want to otherwise click next
23. The
image
should be
added.
Now click
finish
24. Now
right click
on your
computer
name click
on All
Tasks and
click Start
25. WDS
server
should be
configured
now
After following all the steps mentioned above WDS server should be configured correctly to check
whether WDS server is correctly configured or not power on a new client computer which is in
same LAN as WDS server. After it is powered on this server should provide an IP to client and
Windows Installation should begin. If the client computer wants to connect on your domain then
WDS server is configured successfully.
Print Server
“A computer in a network that controls one or more printers. The computer and its printers are
known as a print server” (print server Definition from PC Magazine Encyclopedia, n.d.). The main
function of this server is to manage printers and printing jobs. This server take printing jobs from
clients and manages them in a sequence and sends those printing jobs to printer.
1. First as usual go on server manager and then go to manage and then click on add roles and
features.
2. After that read the guidelines if you want to otherwise click next
After following all the steps mentioned above Print server should be configured correctly to check
whether Print server is correctly configured or not power on a client computer which is on same
LAN as server. Now press windows+R type \\IP address of your server. The printer you added
should be visible there. Right click on printer and click connect. Enter usename and password to
connect to your domain. If the printer is connected you should get following results in devices and
printer in control panel.
1. Click on
notifications and click
on Promote this
server to a domain
controller
2. Now a
configuration wizard
should open. Click on
Add a new domain to
an existing forest.
Enter a new domain
name and change
user. Then click next
3. Enter a password
and click next
After following all the steps mentioned above you should be able to sign out and after you sign in
CDC server should be configured correctly to check whether CDC server is correctly configured or
not go to Tools and click on Active Directory Users and Computers. There add a new user. If the
user has username@childDomain.mainDomain.com then CDC is successfully configured.
domain controller)? - Definition from WhatIs.com, n.d.). This server stores all data of users and
computers but is not able to create new users and computers.
2. On ADDS configuration
wizard click on Add a
domain controller to existing
domain and change user to
administrator and click next
4. On delegated administrator
account select a user which is
added on Read-Only Domain
Controllers group and click
next
After following all the steps mentioned above you should be able to sign out and after you sign in
with a RODC account RODC server should be configured correctly to check whether RODC
server is correctly configured or not go to Tools and click on Active Directory Users and
Computers. There add a new user. If you get the following error message then RODC server is
successfully configured.
1. First as usual go on server manager and then go to manage and then click on add roles and
features.
2. After that read the guidelines if you want to otherwise click next
8. After installation
is complete click
close
After following all the steps mentioned above VPN server should be configured correctly to check
whether VPN server is correctly configured or not power on client computer and connect it to your
workplace by VPN account. If VPN server is configured correctly then on Routing and Remote
access and on Remote access clients you should be able to see name of your client computer.
Analysis Documentation
1. Domain Controller
Test
Expected Output Actual Output
Name of our domain
should be shown on
local server in server
manager
Analysis: Administrator has the right to create users, group and organizations. It shows positive
results and configuration of DC server is successful
2. DNS Test
Expected Output Actual Output
In nslookup name of
domain should be
converted into IP
address and IP address
should be converted
into name of domain
Analysis: DNS server now converts name of domain into IP address and IP address into name of
domain. It shows positive results and configuration of DNS server is successful
3. DHCP Test
Expected Output Actual Output
DHCP server should
provide IP addresses to
clients in a network
Analysis: DHCP server provided IP of the scope we defined which shows positive results and
configuration of DHCP server is successful
Analysis: DHCP Relay agent relayed request of client to DHCP server and client got IP address
which shows positive results and configuration of DHCP Relay Agent is successful
Analysis: Printer was shown in control panel of client which shows positive results and
configuration of print server is successful
6. WDS Test
Expected Output Actual Output
Client operating
system should be
installed in client
computers
Analysis: Client computer asked for a username and password to connect to WDS server which
shows positive results and configuration of WDS server is successful
7. RODC Test
Expected Output Actual Output
Data of main domain
should be visible on
RODC server but it
should not be able to
create and modify
users
Analysis: Data of n controller was replicated in RODC server but it was not allowed to
domai create
a user which shows tive results and configuration of RODC is successful
posi
8. CDC Test
Expected Output Acutal Output
Analysis: A child domain was created and user under name of child domain was also created
which shows positive results and configuration of CDC was successful
9. VPN Test
Expected Output Actual Output
Users from public
network should be able
to connect in the
network with valid
username and password
Analysis: Users were able to connect in our network by using a valid username and password and
connected user were shown in Remote Access Clients in Routing and Remote Access which
shows positive results and configuration of VPN server was successful
Other than these enhancements we could use newest networking cables for faster transmission of
data. We could also upgrade client computers. We could manage our bandwidth as well. We could
have also used a wireless connection while connecting head office and branch office. We could
have used repeaters to regenerate and amplify our weak signals.
began configuration on branch office. We used wires to connect head office and branch office we
then installed server operating system in server computers of branch office after server computers
we configured client computers in branch office.
This system at Landmark IT Pvt. Ltd is designed to give networking services to different types of
organization like School, Bank, Colleges, INGO, NGO etc. With domain controllers we were able
to manage this system properly. DHCP server also provided IP addresses to its clients. With our
VPN servers many users were able to remotely connect in our network. DNS sever was able to
convert domain name into IP address and IP address to domain name. Print server was able to
manage all printers and printing jobs. WDS server successfully deployed operating system on
client computers. RODC server replicated the data of main Domain Controller and CDC server
created a sub domain. By configuring these servers we could save time and effort of our
employees. Now Landmark IT Pvt. Ltd will be able to provide its services to many schools, banks,
colleges, INGOs and NGOs.
Even though a lot of enhancements can be done in this system. This system is working properly
and efficiently. We would be adding some enhancements to this system while maintaining it. Even
though this system lacks some of the advanced features like cloud computing, Virtual Networking
etc. This system is suitable for present day world.
References
Beal, V. (n.d.). What is a Terminal Server? Webopedia Definition. Retrieved from webopedia:
https://www.webopedia.com/TERM/T/terminal_server.html
DHCP Relay Agent in Computer Network - GeeksforGeeks. (n.d.). Retrieved from geeksforgeeks.:
https://www.geeksforgeeks.org/dhcp-relay-agent-in-computer-network/
Hybrid Topology in Computer Network | Working concept of Hybrid Topology | Advantage. (n.d.).
Retrieved from generalnote.com: http://generalnote.com/Computer-Network/Computer-
Network-topologies/Hybrid-Topology.php
print server Definition from PC Magazine Encyclopedia. (n.d.). Retrieved from pcmag:
https://www.pcmag.com/encyclopedia/term/49686/print-server
What is a DHCP Server? | Learn What They Are & How They Work | Infoblox. (n.d.). Retrieved
from Infoblox: https://www.infoblox.com/glossary/dhcp-server/
What is a Domain Controller? - Definition from Techopedia. (n.d.). Retrieved from techopedia:
https://www.techopedia.com/definition/4193/domain-controller-dc
What Is a VPN? - Virtual Private Network - Cisco. (n.d.). Retrieved from cisco:
https://www.cisco.com/c/en/us/products/security/vpn-endpoint-security-clients/what-is-vpn
What Is DNS? | How DNS Works | Cloudflare. (n.d.). Retrieved from cloudflare:
https://www.cloudflare.com/learning/dns/what-is-dns/
What is Host-Based Intrusion Detection System (HIDS)? - Definition from Techopedia. (n.d.).
Retrieved from techopedia: https://www.techopedia.com/definition/12826/host-
basedintrusion-detection-system-hids
What is RODC (read-only domain controller)? - Definition from WhatIs.com. (n.d.). Retrieved
from techtarget: https://searchwindowsserver.techtarget.com/definition/RODC-read-only-
domaincontroll
What is Server Software? - Definition from Techopedia. (n.d.). Retrieved from techopedia:
https://www.techopedia.com/definition/23735/server-software